Showing 14,981 - 15,000 results of 16,989 for search 'Defekt~', query time: 2.43s Refine Results
  1. 14981
  2. 14982

    Détournements et viralité dans la campagne présidentielle de Marine Le Pen de 2022 by Alida Maria Silletti

    Published 2024-12-01
    “…It also confirms that this Twitter profile is a way for Marine Le Pen for stressing disapproval against Emmanuel Macron’s action by inspiring negative feelings such as deception, anger, and hate, and, as a consequence, for reinforcing her ethos.…”
    Get full text
    Article
  3. 14983
  4. 14984

    Rheological comparison of sputum and reconstituted airway epithelium mucus by Lydia Esteban Enjuto, Vassylia Taty Poaty, Mendy Bouveret, Huang Song, Samuel Constant, Jérémy Patarin

    Published 2024-12-01
    “…Abstract Pulmonary mucus serves as a crucial protective barrier in the respiratory tract, defending against pathogens and contributing to effective clearance mechanisms. …”
    Get full text
    Article
  5. 14985

    EXPLICAÇÃO, COMPREENSÃO E DETERMINISMO NA SOCIOLOGIA DE PIERRE BOURDIEU by Gabriel Peters

    Published 2013-03-01
    “…Em seguida, o estudo defende também que esta proposta teórico-metodológica está atrelada a uma distinção frequentemente negligenciada entre os comentadores da obra de Bourdieu, qual seja, aquela entre oobjetivismo, um modo de conhecimento do social que ele procura integrar e superar em sua praxiologia estrutural, e o determinismo, adotado pelo autor como um princípio científico fundamental e, ao mesmo tempo, uma ferramenta ético-política potencialmente emancipatória que é legada por sua sociologia reflexiva.…”
    Get full text
    Article
  6. 14986

    Europol’s role in the fight against cybercrime by Csaba Szabó

    Published 2024-10-01
    “…EC3’s activities significantly enhance information sharing and operational cooperation among member states, thereby increasing the effectiveness of defences against cybercrime. …”
    Get full text
    Article
  7. 14987

    Judge's Consideration of the Surakarta District Court's Divorce Verstek Decision Number 67/Pdt.G/2023/PN Skt by Kania Putri Shabrina, Diana Setiawati

    Published 2024-06-01
    “…The results of this study indicate that The marriage between the plaintiff and the defendant is declared dissolved in accordance with Article 35 of the Marriage Law, and a default judgment in divorce cases can affect various aspects, including marital status, alimony obligations, and the burden of proof in the case. …”
    Get full text
    Article
  8. 14988

    Quotatifs et ethos interactionnel : quelques fonctions de l’introducteur BE LIKE by Yann FUCHS

    Published 2020-06-01
    “…By analysing a few examples of real conversation, this paper defends the necessity to consider the transmission of pragmatic content beyond the unidirectional patterns sometimes associated to discourse analysis, in the specific case of quotatives in interaction.…”
    Get full text
    Article
  9. 14989
  10. 14990

    Paradigm shifters: tricksters and cultural science by Hartley John

    Published 2010-12-01
    “…Both practice a form of creativity based on deception, ‘creative destruction’; renewal by disruption and needs-must adaptation. …”
    Get full text
    Article
  11. 14991
  12. 14992

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  13. 14993

    Proposal of an objective formula-based model for equitable ranking of veterinary colleges by Robert M. Gogal, Steven David Holladay

    Published 2025-02-01
    “…It is designed to provide a rigorous and defendable institutional rank for all veterinary colleges.DiscussionThe new ranking system is designed to be readily adaptable within veterinary colleges as the profession changes, as well as to academic institutions with focuses other than veterinary medicine. …”
    Get full text
    Article
  14. 14994

    Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance by T. A. Romanova, S. V. Mazanik

    Published 2022-11-01
    “…The article uses the cases of the EU industrial, trade policy, and the common security and defense policy to demonstrate the changing institutional balance.The results of the study show that the main institutional beneficiary of "strategic sovereignty" is the European Commission. …”
    Get full text
    Article
  15. 14995

    Izbor koncepcije i modela preventivnog održavanja prema stanju motornih vozila by Svetomir Minić, Jovan Todorović

    Published 1990-07-01
    “…POPS je savremena koncepcija održavanja u intenzivnom razvoju, novi pristup u održavanju motornih vozila, čijom se uspešnom primenom mogu ostvariti značajni efekti - održati traženi nivo pouzdanosti motornog vozila istovremeno smanjujući troškove održavanja, naročito kao rezultat produžavanja ostvarljivog radnog veka sastavnih elemenata motornog vozila. …”
    Get full text
    Article
  16. 14996

    Intelligent reflecting surface-enabled electromagnetic stealth for 6G: recent advances and future prospects by MA Tiantian, ZHENG Beixiong, XIONG Xue, ZHANG Rui

    Published 2024-07-01
    “…This technology utilized IRS to suppress or redirect reflected signals, thus achieving adaptive transparent or deceptive electromagnetic stealth. To fully explore the great potential of IRS in the field of electromagnetic stealth, the basic principles, system models, design challenges, and open issues of IRS-enabled electromagnetic stealth were discussed, aiming to provide directional guidance for the future development of electromagnetic stealth technology.…”
    Get full text
    Article
  17. 14997

    Innate Immune Memory: The Latest Frontier of Adjuvanticity by Elfi Töpfer, Diana Boraschi, Paola Italiani

    Published 2015-01-01
    “…Upon infection or vaccination, monocytes/macrophages can be functionally reprogrammed so as to display an enhanced defensive response against unrelated infections. Epigenetic modifications seem to play a key role in the induction of this “innate memory.” …”
    Get full text
    Article
  18. 14998

    Proposing a Strategic Model for Technological Crisis management - A Case Study on South Pars Gas Complex – Assaluyeh-Bushehr-IRAN by alireza nojoumi

    Published 2020-03-01
    “…The statistical population of this study is 35 persons including managers, safety experts, HSE, and Passive Defense experts. Effective factors on technological hazards management is defined as: leadership and management, human resource, organizational culture, organization agility, organization systems, local infrastructures, production continuity and, continuum inspection is determined through an exhaustive investigation. …”
    Get full text
    Article
  19. 14999

    Intent-based UAV swarm network: management architecture, key technologies, and future vision by LI Xuan, LI Haiyan, ZHANG Lu, ZHANG Yuhang, ZHANG Haojie

    Published 2024-07-01
    “…As an integral part to the air, space and ground integrated network, unmanned aerial vehicle (UAV) swarms have shown broad application prospects in complex tasks such as emergency search and rescue, offensive and defensive confrontation, intelligence reconnaissance and surveillance. …”
    Get full text
    Article
  20. 15000